NEWS

bluedog’s new compliance module allows firms to reassure customers

bluedog Security Monitoring has launched a new compliance module which enables users to check the status of their cybersecurity at any time.

Read More

NEWS

Cloud-based threat intelligence platform

Allows on-demand API access to turnkey cyberthreat expertise.

Read More

NEWS

Cyberattacks are becoming increasingly targeted in nature

The experts at Positive Technologies have released their cybersecurity threatscape findings for the third quarter of 2019. The main trends highlighted in the report include an increase in the number of unique cyber incidents, a large amount of activity by APT groups engaged in targeted attacks, and a two-to-one greater incidence of data theft in comparison to direct financial gain as an attack motive.

Read More

NEWS

Trend Micro launches Cloud One

Trend Micro has launched Trend Micro Cloud One, a security services platform for organizations building applications in the cloud. Cloud One allows developers to rapidly build applications using the cloud services they want, while managing their organization’s risk.

Read More

NEWS

Business negligence of social engineering hacks ‘disaster waiting to happen’

Businesses across the globe risk being hit by potentially disastrous cyber-attacks because they aren’t adequately protecting themselves against basic social engineering techniques such as phishing, according to new research.

Read More

NEWS

ED&F Man transforms threat detection and investigation

Commodities trader finds the sweet spot to expose hidden attackers, spot privilege misuse and perform conclusive incident investigations.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Businesses across the world still struggle to understand, optimise, and protect their rapidly...
In the run-up to GDPR, new research from the DMA and Acxiom shows that people are increasing...
Lack of qualified staff named second biggest challenge with user access and vulnerability...
University employs human behavioural conditioning techniques designed to build student and staff...
45% of businesses with over 100,000 computer terminals must wait at least a month before installing...
Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify...